Analysis

  • max time kernel
    289s
  • max time network
    291s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2024, 04:57

General

  • Target

    2b996b0c447b4778b2cee50d14404b12f54a6d2698374c7159b5a5a988ac6529.exe

  • Size

    403KB

  • MD5

    e99773e1bacf395199dbdd905ee26591

  • SHA1

    eb0f46bed333bfc77537465a3f6ea1f6a163b32d

  • SHA256

    2b996b0c447b4778b2cee50d14404b12f54a6d2698374c7159b5a5a988ac6529

  • SHA512

    c212094c5d4486bfbae83c6f356c696bcf1cb2db044199ccfd63e9d97bb73c43f920ea9122d91a1c11821ebe02b6992f79d53d23526a602a7bb5b5d500d0b06d

  • SSDEEP

    6144:R3wnORugzRRFonQZnTyESQpg/rKjWAvG17t1aWZM1iIJC/v4ZF:lwn+uERkQZT4Wg/r/B17t1aWZQ5C/wZF

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • Detects Arechclient2 RAT 1 IoCs

    Arechclient2.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b996b0c447b4778b2cee50d14404b12f54a6d2698374c7159b5a5a988ac6529.exe
    "C:\Users\Admin\AppData\Local\Temp\2b996b0c447b4778b2cee50d14404b12f54a6d2698374c7159b5a5a988ac6529.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\u31c.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u31c.0.exe"
      2⤵
      • Executes dropped EXE
      PID:1856
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2312
    • C:\Users\Admin\AppData\Local\Temp\u31c.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u31c.1.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
        "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

          Filesize

          7.6MB

          MD5

          862bf3003dca41d88ac49a6846149623

          SHA1

          b34f1d42dd0649d6b83f9a92124a554f48df0434

          SHA256

          50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

          SHA512

          fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\MSVCP140.dll

          Filesize

          427KB

          MD5

          71a0aa2d05e9174cefd568347bd9c70f

          SHA1

          cb9247a0fa59e47f72df7d1752424b33a903bbb2

          SHA256

          fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

          SHA512

          6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\VCRUNTIME140.dll

          Filesize

          81KB

          MD5

          16b26bc43943531d7d7e379632ed4e63

          SHA1

          565287de39649e59e653a3612478c2186096d70a

          SHA256

          346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

          SHA512

          b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

          Filesize

          79KB

          MD5

          8e1bbc6d6c4d207393b59853f73945ae

          SHA1

          b66d632eae41267175bf5332d43a785dd929d79f

          SHA256

          b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

          SHA512

          1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

          Filesize

          938KB

          MD5

          b15bac961f62448c872e1dc6d3931016

          SHA1

          1dcb61babb08fe5db711e379cb67335357a5db82

          SHA256

          bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

          SHA512

          932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

          Filesize

          1.3MB

          MD5

          3bee67dd0e04559c8fdc7761336dee47

          SHA1

          027ef9dca01fb928db79e57b418130165f06ed5f

          SHA256

          57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

          SHA512

          35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

        • C:\Users\Admin\AppData\Local\Temp\c8a25654

          Filesize

          3.8MB

          MD5

          13418f74a7ce25cdd6997c9fcb718a0e

          SHA1

          f4c880821fee72c37c882b1e8ebf100efcafe31c

          SHA256

          a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

          SHA512

          59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

        • C:\Users\Admin\AppData\Local\Temp\d672c28d

          Filesize

          1.4MB

          MD5

          db9d68999e38b0d772b596632ad19b2c

          SHA1

          f175c4fbb3130db9d234d9b400b2f64cbeb04464

          SHA256

          abf30028a72414c5c19b6f99092f72875c12b2b5d70d600f42e82db6afc0f0f2

          SHA512

          693001a1a84d91a13dacf0ffb9a16991915f41f53bc070bc1e791b74a5a17d742abc61e1fb1a490593d534ad4a2048bae44731841cfd251ebc8d830fe51d81ec

        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

          Filesize

          3KB

          MD5

          093f70bf7678290d9d39318156ed6786

          SHA1

          f00de260d1cfdb1c50a5fd1de202bd535dce7253

          SHA256

          de3ca208cc3eb369911120aaa301e8b61be7aba08381d152d8f98f30a2bbd4b0

          SHA512

          d3260a1994c92f7abb7043f2872ddc6f5e8787a6207911143504fc0b4e03e8d934449340b977c81ccd04439cb60c08b990d567646a106f78637b66c71a739cd6

        • C:\Users\Admin\AppData\Local\Temp\tmpEDB8.tmp

          Filesize

          20KB

          MD5

          c9ff7748d8fcef4cf84a5501e996a641

          SHA1

          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

          SHA256

          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

          SHA512

          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

        • C:\Users\Admin\AppData\Local\Temp\u31c.0.exe

          Filesize

          270KB

          MD5

          51627ffc0192dd8143c0c0208392166d

          SHA1

          dba1a938466fd61f41198400e2a899fa43819d7e

          SHA256

          3200fac8ca4eb6abba8e97221ee8e74f68edc6385b02bb5d04adb57e32432b6b

          SHA512

          f92f5d1f598480a34f5bad1a58de59b7c11e9311ee64147c33fedc2889f9184f91e0e02237c2eff6a5efa02543a87d36c99c34ff2b361fca8bd5d8a3baa6025b

        • C:\Users\Admin\AppData\Local\Temp\u31c.1.exe

          Filesize

          4.6MB

          MD5

          397926927bca55be4a77839b1c44de6e

          SHA1

          e10f3434ef3021c399dbba047832f02b3c898dbd

          SHA256

          4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

          SHA512

          cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

        • \Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

          Filesize

          590KB

          MD5

          63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

          SHA1

          fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

          SHA256

          8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

          SHA512

          32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

        • memory/1456-57-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/1456-58-0x00007FFB82050000-0x00007FFB8222B000-memory.dmp

          Filesize

          1.9MB

        • memory/1616-87-0x00007FFB82050000-0x00007FFB8222B000-memory.dmp

          Filesize

          1.9MB

        • memory/1616-84-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/1616-121-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/1616-120-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/1616-124-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/1856-10-0x0000000002D70000-0x0000000002D97000-memory.dmp

          Filesize

          156KB

        • memory/1856-9-0x0000000002E20000-0x0000000002F20000-memory.dmp

          Filesize

          1024KB

        • memory/1856-12-0x0000000000400000-0x0000000002C26000-memory.dmp

          Filesize

          40.1MB

        • memory/1856-11-0x0000000000400000-0x0000000002C26000-memory.dmp

          Filesize

          40.1MB

        • memory/2312-138-0x0000000005340000-0x00000000053D2000-memory.dmp

          Filesize

          584KB

        • memory/2312-143-0x0000000005440000-0x0000000005490000-memory.dmp

          Filesize

          320KB

        • memory/2312-202-0x0000000006510000-0x000000000651A000-memory.dmp

          Filesize

          40KB

        • memory/2312-123-0x0000000071AC0000-0x0000000072E43000-memory.dmp

          Filesize

          19.5MB

        • memory/2312-192-0x0000000006150000-0x00000000061B6000-memory.dmp

          Filesize

          408KB

        • memory/2312-191-0x0000000006040000-0x000000000605E000-memory.dmp

          Filesize

          120KB

        • memory/2312-190-0x0000000006520000-0x0000000006A4C000-memory.dmp

          Filesize

          5.2MB

        • memory/2312-184-0x00000000054D0000-0x00000000054E0000-memory.dmp

          Filesize

          64KB

        • memory/2312-183-0x00000000713D0000-0x0000000071ABE000-memory.dmp

          Filesize

          6.9MB

        • memory/2312-144-0x00000000055A0000-0x0000000005616000-memory.dmp

          Filesize

          472KB

        • memory/2312-139-0x00000000713D0000-0x0000000071ABE000-memory.dmp

          Filesize

          6.9MB

        • memory/2312-137-0x0000000000F00000-0x0000000000FC6000-memory.dmp

          Filesize

          792KB

        • memory/2312-142-0x00000000056B0000-0x0000000005872000-memory.dmp

          Filesize

          1.8MB

        • memory/2312-140-0x00000000058F0000-0x0000000005DEE000-memory.dmp

          Filesize

          5.0MB

        • memory/2312-141-0x00000000054D0000-0x00000000054E0000-memory.dmp

          Filesize

          64KB

        • memory/3936-95-0x0000000000400000-0x0000000004059000-memory.dmp

          Filesize

          60.3MB

        • memory/3936-86-0x0000000000400000-0x0000000004059000-memory.dmp

          Filesize

          60.3MB

        • memory/3936-15-0x0000000004300000-0x0000000004400000-memory.dmp

          Filesize

          1024KB

        • memory/3936-2-0x0000000004500000-0x000000000456E000-memory.dmp

          Filesize

          440KB

        • memory/3936-13-0x0000000000400000-0x0000000004059000-memory.dmp

          Filesize

          60.3MB

        • memory/3936-1-0x0000000004300000-0x0000000004400000-memory.dmp

          Filesize

          1024KB

        • memory/4304-151-0x0000027C23180000-0x0000027C23290000-memory.dmp

          Filesize

          1.1MB

        • memory/4304-168-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-189-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-188-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-187-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-186-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-185-0x00007FFB66000000-0x00007FFB669EC000-memory.dmp

          Filesize

          9.9MB

        • memory/4304-181-0x0000027C289B0000-0x0000027C289CE000-memory.dmp

          Filesize

          120KB

        • memory/4304-180-0x0000027C28A20000-0x0000027C28A42000-memory.dmp

          Filesize

          136KB

        • memory/4304-148-0x00007FFB66000000-0x00007FFB669EC000-memory.dmp

          Filesize

          9.9MB

        • memory/4304-149-0x0000027C04FF0000-0x0000027C088E8000-memory.dmp

          Filesize

          57.0MB

        • memory/4304-150-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-152-0x0000027C08D10000-0x0000027C08D20000-memory.dmp

          Filesize

          64KB

        • memory/4304-153-0x0000027C0A640000-0x0000027C0A64C000-memory.dmp

          Filesize

          48KB

        • memory/4304-178-0x0000027C289D0000-0x0000027C28A20000-memory.dmp

          Filesize

          320KB

        • memory/4304-154-0x0000027C0A630000-0x0000027C0A644000-memory.dmp

          Filesize

          80KB

        • memory/4304-155-0x0000027C0A770000-0x0000027C0A794000-memory.dmp

          Filesize

          144KB

        • memory/4304-156-0x0000027C0A610000-0x0000027C0A61A000-memory.dmp

          Filesize

          40KB

        • memory/4304-158-0x0000027C234C0000-0x0000027C23572000-memory.dmp

          Filesize

          712KB

        • memory/4304-157-0x0000027C22FD0000-0x0000027C22FFA000-memory.dmp

          Filesize

          168KB

        • memory/4304-159-0x0000027C23570000-0x0000027C235EA000-memory.dmp

          Filesize

          488KB

        • memory/4304-160-0x0000027C23000000-0x0000027C23062000-memory.dmp

          Filesize

          392KB

        • memory/4304-161-0x0000027C23670000-0x0000027C236E6000-memory.dmp

          Filesize

          472KB

        • memory/4304-162-0x0000027C0A620000-0x0000027C0A62A000-memory.dmp

          Filesize

          40KB

        • memory/4304-166-0x0000027C236F0000-0x0000027C239F0000-memory.dmp

          Filesize

          3.0MB

        • memory/4304-179-0x0000027C28980000-0x0000027C2898C000-memory.dmp

          Filesize

          48KB

        • memory/4304-169-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-171-0x0000027C277D0000-0x0000027C277D8000-memory.dmp

          Filesize

          32KB

        • memory/4304-170-0x0000027C0A7B0000-0x0000027C0A7C0000-memory.dmp

          Filesize

          64KB

        • memory/4304-172-0x0000027C27850000-0x0000027C27888000-memory.dmp

          Filesize

          224KB

        • memory/4304-173-0x0000027C28950000-0x0000027C2895A000-memory.dmp

          Filesize

          40KB

        • memory/4304-174-0x0000027C28960000-0x0000027C28982000-memory.dmp

          Filesize

          136KB

        • memory/4304-175-0x0000027C28EC0000-0x0000027C293E6000-memory.dmp

          Filesize

          5.1MB

        • memory/4344-136-0x0000000000400000-0x00000000008AD000-memory.dmp

          Filesize

          4.7MB

        • memory/4344-96-0x00000000008C0000-0x00000000008C1000-memory.dmp

          Filesize

          4KB

        • memory/4344-147-0x0000000000400000-0x00000000008AD000-memory.dmp

          Filesize

          4.7MB

        • memory/4896-38-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-33-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-31-0x00007FFB82050000-0x00007FFB8222B000-memory.dmp

          Filesize

          1.9MB

        • memory/4896-30-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-48-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/4896-24-0x00000000029D0000-0x00000000029D1000-memory.dmp

          Filesize

          4KB

        • memory/4896-23-0x0000000000400000-0x0000000000BEB000-memory.dmp

          Filesize

          7.9MB

        • memory/4896-81-0x0000000000400000-0x0000000000BEB000-memory.dmp

          Filesize

          7.9MB

        • memory/4896-80-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/5012-82-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/5012-79-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB

        • memory/5012-78-0x00007FFB82050000-0x00007FFB8222B000-memory.dmp

          Filesize

          1.9MB

        • memory/5012-77-0x0000000073230000-0x00000000733AB000-memory.dmp

          Filesize

          1.5MB